![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 326](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862326.webp)
Table 90: Configuring Syslog Servers Details
Your Action
Function
Option
User Access / Admin Access / Sensors > Syslog Servers > Settings tab
Enter the name or IP address
of the syslog server.
Specifies the syslog server where you want
to store your log files (optional).
Server name/IP
Select the facility from the
drop-down list.
Specifies the facility to map facilities on
your syslog server.
NOTE: The Secure Access device provides
eight facilities (LOCAL0- LOCAL7).
Facility
Select the filter.
Specifies the filter you want to apply to the
log file.
Filter
Related
Documentation
Configuring Custom Filters and Formats for Log Files (NSM Procedure) on page 308
•
•
Configuring Client-Side Logs (NSM Procedure) on page 310
Configuring Custom Filters and Formats for Log Files (NSM Procedure)
To configure custom filters and formats for log files:
1.
In the NSM navigation tree, select
Device Manager > Devices
. Click the
Device Tree
tab, and then double-click the Secure Access device for which you want to configure
custom filters and formats for log files.
2.
Click the
Configuration
tab, and select
System > Log/Monitoring > Filters
. The
corresponding workspace appears.
3.
Add or modify settings as specified in Table 91 on page 308.
4.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modification.
Table 91: Custom Filters and Formats for Log Files Configuration Details
Your Action
Function
Option
Enter the name.
Specifies the name of the filter.
Filter
Name
Enter the start date.
Specifies the start date in
which the Secure Access
device writes logs in the log file.
Start Date
Enter the end date.
Specifies the end date in which
the Secure Access device
writes logs in the log file.
End Date
Copyright © 2010, Juniper Networks, Inc.
308
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...